CN106156646B - Information calling method and electronic equipment - Google Patents

Information calling method and electronic equipment Download PDF

Info

Publication number
CN106156646B
CN106156646B CN201510159107.5A CN201510159107A CN106156646B CN 106156646 B CN106156646 B CN 106156646B CN 201510159107 A CN201510159107 A CN 201510159107A CN 106156646 B CN106156646 B CN 106156646B
Authority
CN
China
Prior art keywords
application program
privacy space
preset
calling
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510159107.5A
Other languages
Chinese (zh)
Other versions
CN106156646A (en
Inventor
李雅芹
陈文珊
张蓓佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201510159107.5A priority Critical patent/CN106156646B/en
Publication of CN106156646A publication Critical patent/CN106156646A/en
Application granted granted Critical
Publication of CN106156646B publication Critical patent/CN106156646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to the field of information security, and discloses an information calling method and electronic equipment, which are used for solving the technical problem of low information confidentiality in the prior art, wherein the method is applied to the electronic equipment, a first control interface of a first application program is displayed on the electronic equipment, and the method comprises the following steps: detecting and obtaining a first input parameter of a user of the electronic equipment for a first control interface; judging whether the first input parameter is a first preset parameter or not; and when the first input parameter is a first preset parameter, calling a privacy space of the electronic equipment, wherein the second application program bearing the privacy space and the first application program are different application programs. The technical effect of improving the confidentiality of the privacy space is achieved.

Description

Information calling method and electronic equipment
Technical Field
The invention relates to the field of information security, in particular to an information calling method and electronic equipment.
Background
With the continuous development of science and technology, electronic technology has also obtained rapid development, and the kind of mobile product is also more and more, and people also enjoy various facilities that scientific and technological development brought. People can enjoy comfortable life brought along with the development of science and technology through various types of electronic equipment. For example, electronic devices such as smart phones and tablet computers have become an important part of people's lives, and users can listen to music, play games and the like by using the electronic devices such as smart phones and tablet computers, so as to relieve pressure caused by modern fast-paced lives.
In the prior art, in order to ensure the security of information on electronic equipment, files needing to be kept secret can be encrypted, then the storage position of the secret file is basically fixed, and the corresponding secret file can be conveniently searched on the electronic equipment, so that the technical problem of low confidentiality exists; moreover, after other users know that the electronic equipment contains the confidential files, the users want to crack or check the confidential files, so that the security is low.
Disclosure of Invention
The invention provides an information calling method and electronic equipment, and aims to solve the technical problem that the confidentiality of information is low in the prior art.
In a first aspect, an embodiment of the present invention provides an information invoking method, which is applied to an electronic device, where a first control interface of a first application program is displayed on the electronic device, and the method includes:
detecting and obtaining a first input parameter of a user of the electronic equipment for the first control interface;
judging whether the first input parameter is a first preset parameter or not;
and when the first input parameter is the first preset parameter, calling a privacy space of the electronic equipment, wherein a second application program bearing the privacy space and the first application program are different application programs.
Optionally, before the determining whether the first input parameter is the first preset parameter, the method further includes:
judging whether the user is a preset type of user or not;
the judging whether the first input parameter is a first preset parameter specifically comprises:
and when the user is not the user of the preset type, judging whether the first input parameter is the first preset parameter.
Optionally, the invoking the privacy space of the electronic device specifically includes:
calling a third application program corresponding to the privacy space through the first application program;
invoking, by the third application, the privacy space.
Optionally, the invoking, by the first application program, a third application program corresponding to the privacy space specifically includes:
and calling the third application program through an Intent mode.
Optionally, the invoking, by the first application program, a third application program corresponding to the privacy space specifically includes:
judging whether the third application program is a resident background application program or not;
and when the third application program is the resident background application program, calling the third application program in a broadcasting mode.
Optionally, the privacy space includes: and at least one of an application program with a security level higher than a preset level and a file with a security level higher than the preset level.
Optionally, the invoking the privacy space of the electronic device specifically includes:
calling a control interface of the information contained in the privacy space; or
Invoking an iconic interface of the information contained in the privacy space.
Optionally, when the first input parameter is the first preset parameter, invoking a privacy space of the electronic device, specifically including:
judging whether the electronic equipment receives N input parameters aiming at control interfaces of N application programs in a preset time period before the first input parameter is obtained, wherein each input parameter in the N input parameters meets a corresponding preset condition, and N is a positive integer;
and when the electronic equipment receives the N input parameters, calling the privacy space.
Optionally, the first control interface specifically includes: a communication interface of the first contact.
Optionally, the invoking the privacy space of the electronic device specifically includes: when the icon interface of the information contained in the privacy space is called, the method further comprises the following steps:
detecting and obtaining information stored in the electronic equipment;
judging whether selection operation aiming at first information exists or not, wherein the first information is information stored in the electronic equipment;
and when the selection operation exists, adding the jump interface of the first information into the privacy space, and controlling the first information to be in a hidden state.
Optionally, the invoking the privacy space of the electronic device specifically includes:
and calling the privacy space corresponding to the first input parameter from a plurality of privacy spaces.
Optionally, before the determining whether the first input parameter is the first preset parameter, the method further includes:
and determining the first preset parameter corresponding to the current time from a plurality of preset parameters.
In another aspect, an embodiment of the present invention provides an electronic device, including:
the first detection module is used for detecting and obtaining a first input parameter of a user of the electronic equipment aiming at a first control interface, wherein the first control interface is a control interface of a first application program displayed on the electronic equipment;
the first judgment module is used for judging whether the first input parameter is a first preset parameter or not;
the calling module is used for calling the privacy space of the electronic equipment when the first input parameter is the first preset parameter, wherein a second application program bearing the privacy space and the first application program are different application programs.
Optionally, the electronic device further includes:
the second judging module is used for judging whether the user is a preset type of user before judging whether the first input parameter is a first preset parameter;
the first judging module is specifically configured to:
and when the user is not the user of the preset type, judging whether the first input parameter is the first preset parameter.
Optionally, the calling module specifically includes:
the first calling unit is used for calling a third application program corresponding to the privacy space through the first application program;
and the second calling unit is used for calling the privacy space through the third application program.
Optionally, the calling module is specifically configured to:
and calling the third application program through an Intent mode.
Optionally, the calling module specifically includes:
the first judging unit is used for judging whether the third application program is a resident background application program or not;
and the third calling unit is used for calling the third application program in a broadcasting mode when the third application program is the resident background application program.
Optionally, the privacy space includes: and at least one of an application program with a security level higher than a preset level and a file with a security level higher than the preset level.
Optionally, the calling module is specifically configured to:
calling a control interface of the information contained in the privacy space; or
Invoking an iconic interface of the information contained in the privacy space.
Optionally, the calling module specifically includes:
a second determining unit, configured to determine whether the electronic device receives N input parameters of control interfaces for N applications within a preset time period before obtaining the first input parameter, where each input parameter of the N input parameters meets a corresponding preset condition, and N is a positive integer;
a fourth invoking unit, configured to invoke the privacy space when the electronic device receives the N input parameters.
Optionally, the first control interface specifically includes: a communication interface of the first contact.
Optionally, the calling module is specifically configured to: when the icon interface of the information contained in the privacy space is called, the electronic device further includes:
the second detection module is used for detecting and obtaining the information stored in the electronic equipment;
a third determining module, configured to determine whether a selection operation for first information exists, where the first information is information stored in the electronic device;
and the adding module is used for adding the jump interface of the first information into the privacy space and controlling the first information to be in a hidden state when the selection operation exists.
Optionally, the calling module is specifically configured to:
and calling the privacy space corresponding to the first input parameter from a plurality of privacy spaces.
Optionally, the electronic device further includes:
the determining module is used for determining the first preset parameter corresponding to the current time from a plurality of preset parameters before judging whether the first input parameter is the first preset parameter.
The invention has the following beneficial effects:
in the embodiment of the invention, first input parameters of a user of the electronic equipment for a first control interface are detected and obtained, wherein the first control interface corresponds to a first application program; then judging whether the first input parameter is a first preset parameter or not; and finally, calling the privacy space of the electronic equipment when the first input parameter is the first preset parameter. That is to say, the jump interface of the privacy space is disguised as the first control interface of the first application program, wherein the second application program bearing the privacy space and the first application program are different application programs, that is, the user can call the privacy space when operating the first application program, so that the technical effect of improving the confidentiality of the privacy space is achieved, and other users cannot judge whether the privacy space is installed on the electronic device according to the application list, so that cracking cannot be performed, and the security is also high.
Drawings
FIG. 1 is a flow chart of an information invoking method in an embodiment of the present invention;
fig. 2a is a schematic diagram of a privacy space directly invoked by a first application in an information invocation method according to an embodiment of the present invention;
fig. 2b is a schematic diagram of invoking a privacy space by a second application in the information invoking method according to the embodiment of the present invention;
fig. 3 is a flowchart of invoking a privacy space by a second application in an information invoking method according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating invoking a privacy space via a plurality of input parameters in an information invoking method according to an embodiment of the present invention;
FIG. 5 is a flowchart of adding first information to a privacy space in an information invoking method according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a privacy space setting interface in an information invoking method according to an embodiment of the present invention;
fig. 7 is a block diagram of an electronic device in an embodiment of the invention.
Detailed Description
The invention provides an information calling method and electronic equipment, and aims to solve the technical problem that the confidentiality of information is low in the prior art.
In order to solve the technical problems, the general idea of the embodiment of the present application is as follows:
firstly, detecting and obtaining a first input parameter of a user of the electronic equipment aiming at a first control interface, wherein the first control interface corresponds to a first application program; then judging whether the first input parameter is a first preset parameter or not; and finally, calling the privacy space of the electronic equipment when the first input parameter is the first preset parameter. That is to say, the jump interface of the privacy space is disguised as the first control interface of the first application program, wherein the second application program bearing the privacy space and the first application program are different application programs, that is, the user can call the privacy space when operating the first application program, so that the technical effect of improving the confidentiality of the privacy space is achieved, and other users cannot judge whether the privacy space is installed on the electronic device according to the application list, so that cracking cannot be performed, and the security is also high.
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
In a first aspect, an embodiment of the present invention provides an information invoking method, which is applied to an electronic device, where a first control interface of a first application program is displayed on the electronic device, and with reference to fig. 1, the method includes:
step S101: detecting and obtaining a first input parameter of a user of the electronic equipment for a first control interface;
step S102: judging whether the first input parameter is a first preset parameter or not;
step S103: and when the first input parameter is a first preset parameter, calling a privacy space of the electronic equipment, wherein a second application program bearing the privacy space and the first application program are different application programs.
For example, the electronic device may be: the embodiment of the application is not particularly limited as to which electronic equipment is the electronic equipment with the interactive communication function, such as a landline telephone, a functional mobile phone, a smart phone, a tablet personal computer, a smart television, a smart refrigerator and the like.
For example, the first application is, for example: calculator application, piano application, address book application, etc. when the first application is the calculator application, the first control interface is, for example: a computing interface of a calculator application; when the first application is a piano application, the first control interface is, for example: a piano application playing interface; when the first application is an address book application, the first control interface is, for example: a contact list interface, a communication interface for the first contact, and so on.
As a further preferred embodiment, if the first control interface is a communication interface of a first contact, the first contact for example: contacts that are more closely related to the user of the electronic device, such as: a father (or wife) of a user of the electronic device, a male (female) friend, a parent, a child, and so forth. The technical effect of security is enhanced because the contacts who are closely related to the user of the electronic device may want to know the privacy space of the user of the electronic device, but they do not generally view the chat records of the user of the electronic device and the user.
In step S101, for example, if the first application is a calculator application, the first input parameter is, for example: formulas, numbers, etc. entered by the user; if the first application is a piano application, the first input parameters are, for example: notes, tones or a piece of a tune, etc. input by the user; if the first application is a particular contact interface, the first input parameter is, for example: for the first input parameter, which may be generally set as an input parameter corresponding to the normal function of the first application, and specifically, which kind of input parameter, the embodiment of the present invention is not listed in detail and is not limited.
In step S102, a user may set a custom expression (i.e., a first preset parameter) in an instruction invoking interface, where the instruction invoking interface may be located in the first application program or in another application program, and the preferred instruction invoking interface is located in another application program different from the first application program, and in this case, the other user cannot know which application program the entry of the specific privacy space is associated with, so that the security is higher.
Taking the first application program as an example of a calculator application program, the calculator application program can set an instruction calling interface relative to the existing calculator application program, and a user sets a custom expression "1111 ═ as a method for starting a privacy space in a keyboard input mode; or, the first application program is a calculator application program, the piano application program is added with an instruction calling interface relative to the existing piano application program, after the instruction calling interface is opened by the user, the application program (namely, the first application program) called by the instruction is selected, and then the first preset parameter is set, and the like.
In the process of using a first application program (for example, a calculator application program) by a user, the first application program can store characters input by the user as a string type string array, and each time the user inputs the string type string array, the program can compare the string type string array with a custom expression (namely, a first preset parameter) which is preset by the user.
In addition, in order to reduce the processing load of the electronic device, a trigger parameter may be set in the instruction invoking interface, where the trigger parameter is, for example: "═ #", "@", etc., different triggering parameters may be set according to actual needs, and this embodiment of the present invention is not listed in detail and is not limited. If the electronic equipment detects the trigger parameter, acquiring a section of input parameter before the trigger parameter as a first input parameter, and comparing whether the first input parameter is a first preset parameter; otherwise, no comparison is made.
As a further preferred embodiment, before determining whether the first input parameter is the first preset parameter based on step S102, the method further comprises:
a first preset parameter corresponding to the current time is determined from a plurality of preset parameters.
For example, when setting the first preset parameter, the user of the electronic device may set different first preset parameters for different times, for example, as shown in table 1 or table 2, where the first application program in table 1 is different and the first application program in table 2 is the same (e.g., all are document input programs, document browsing programs, etc.).
TABLE 1
Figure GDA0002601421700000081
TABLE 2
Figure GDA0002601421700000082
Figure GDA0002601421700000091
Taking table 1 as an example, after detecting the input operation of the user for the four applications shown in table 1, the electronic device first determines the current time, for example: and after 10 months to 12 months, determining that the first preset parameter is as follows: when the calculator application program inputs '1111 ═ and if the input operation received by the electronic equipment is the input operation aiming at the calculator and the input parameter is' 1111 ═ then the privacy space is called; otherwise, the privacy space is not invoked.
Taking table 2 as an example, after detecting an input operation of the user for the document input program, the electronic device first determines the current time, for example: if the current time is 2 months, then the current time is determined to be between 1 month and 3 months, and then it is determined that the first preset parameter is "3 +4+ 5? ", if the first input parameter received by the electronic device is" 3+4+ 5? If yes, the privacy space is called, otherwise, the privacy space is not called.
Of course, different times in the above table 1 and table 2 correspond to different input parameters, which are only two examples, and in the specific implementation process, multiple times may be set according to actual requirements or the corresponding relationship between the current position information of the electronic device and the different input parameters may be determined, and the embodiment of the present invention is not listed in detail and is not limited.
In the scheme, the first preset parameters corresponding to the calling of the privacy space are different according to different time, so that the security and confidentiality of the calling of the privacy space are further improved.
As a further preferred embodiment, before determining whether the first input parameter is the first preset parameter based on step S102, the method further comprises: judging whether the user is a preset type of user or not;
in this case, determining whether the first input parameter is a first preset parameter specifically includes:
and when the user is not the preset type of user, judging whether the first input parameter is the first preset parameter.
For example, the preset types of users are, for example: a child; wherein, it can be determined whether the user is a preset type of user by the width of the input track of the first input parameter, if the width of the input track is greater than a preset value, for example: if the distance between the user and the user is 0.6cm, 0.55cm and the like, the user is an adult, namely the user is not a preset type of user, otherwise, the user is a preset type of user; or the image of the user can be acquired through a camera of the electronic device, and then whether the user is a preset type of user or not is judged in an image recognition mode, and the like.
In order to prevent the eyesight and learning of a child from being affected, parents can limit the time of the child watching the smart television, in this case, all the channel related information on the smart television can be set in a privacy space, and the first input parameter is set to be the first preset parameter only when the user is not a preset type of user; otherwise, whether the first input parameter is a preset parameter or not is not judged, and then the privacy space is not opened, so that the television cannot be watched, and further the condition that the child can watch the television under the supervision state of parents can be ensured.
In step S103, the privacy space refers to an application program that stores information with a higher security level on the electronic device, where the information with a higher security level is, for example: short messages, contacts, documents, APP and the like with higher security level. Information two kinds of information stored in the private space will be described in detail below, and of course, in the implementation process, the following two cases are not limited.
First, the privacy space comprises: and the safety level is higher than the application program of the preset level.
For example, an application with a security level higher than a preset level is often an application that needs a password to use, such as: property-related applications (e.g., shopping-like applications, payment-like applications, etc.), privacy-related applications (e.g., web-disks, chat software, etc.).
And secondly, the safety level of the file is higher than the preset level.
For example, the file is, for example: video, images, communications, and the like, wherein the communications may in turn include: contact information, communication content information, communication records, and the like.
In step S103, various forms of privacy spaces may be called, and two of them are listed below for description, and of course, in the specific implementation process, the following two cases are not limited.
The first method is to call a privacy space of the electronic device, and specifically includes: a control interface for information contained in the privacy space is invoked.
For example, assuming that the privacy space contains only one file, the user of the electronic device does not need to select which file to view, and in this case, the user directly jumps to the corresponding control interface. For example, if the privacy space includes the document a, when the privacy space is called, an editing interface or a reading interface of the document a is directly opened; if the privacy space contains the application program B, directly starting an operation interface of the application program B and the like when the privacy space is called; if the privacy space includes the contact C, a communication interface for communicating with the contact C, a history communication record interface, or the like is directly displayed when the privacy space is called.
For another example, if the privacy space only contains one type of file, the user of the electronic device does not need to select which type of file to view, and in this case, the user directly jumps to the control interface of the type of file. For example: assume that the privacy space contains only documents, which in turn contain document a1, document a2, and document A3, in which case the control interface is, for example: the electronic device can display a certain document in document A1, document A2 and document A3 through the selection operation of a user, and the control interface is, for example: the reading interface of document a1, which may continue to display document a2 and document A3 after the user has read document a 1; assuming that the privacy space contains only videos, the control interface is, for example: a video playing interface, a video listing interface, etc.; assuming that the privacy space only contains the address book, the control interface is, for example: a contact list interface, a contact interface for a particular contact, etc.
The second method calls a privacy space of the electronic device, and specifically comprises the following steps: an iconic interface of the contained information of the privacy space is invoked.
For example, assume that the information contained in the private space is a variety of information, such as: the method comprises the steps that a document, an application program, an address book and the like are contained, in this case, the electronic equipment does not determine the preference of a user of the electronic equipment, so that an icon interface of information contained in a privacy space is called, namely, an icon of the document, an icon of the application program and an icon of the address book are respectively displayed on the icon interface;
for example, if the privacy space includes a plurality of pieces of information, in this case, different icons may be generated for each of the plurality of pieces of information and displayed on the icon interface, and, taking the information included in the privacy space as document a1, document a2, and document A3 as an example, icons of document a1, document a2, and document A3 may be generated and displayed on the icon interface, respectively.
In step S103, the privacy space may be called in various ways, and two ways of the privacy space are listed below for description, which is not limited to the following two ways in the specific implementation process.
The first method, invoking a privacy space of an electronic device, specifically includes: the privacy space is invoked by the first application.
For example, the calling interface of the privacy space is set as a part of the first application program, so that the privacy space can be called directly by the first application program. Taking the first application program as the calculator application program as an example, as shown in fig. 2a, the calculator application program includes a privacy space module, and when it is detected that the first input parameter is the first preset parameter, the privacy space is directly called by the calculator application program.
In a second manner, invoking a privacy space of an electronic device, please refer to fig. 3, which specifically includes:
step S301: calling a third application program corresponding to the privacy space through the first application program;
step S302: the privacy space is invoked by a third application.
In step S301, the third application program may be called in various ways, and two of them are listed below for description, and of course, in the specific implementation process, the calling is not limited to the following two cases.
Calling a third application program corresponding to the privacy space through the first application program, specifically: and calling the third application program through an Intent mode.
The Android is responsible for finding a corresponding component (namely a third application program) according to the description of the Intent, transmitting the Intent to the called component and completing the calling of the component.
Or taking the first application program as the calculator application program as an example, the user first sets a custom expression (i.e. a first preset parameter) in the calculator application program, and then after the user correctly inputs the expression, as shown in fig. 2b, the calculator application program may create an Intent, for example: "new Intent (); ", and set" intent.setclass (a.this, b.class); "here B is the third application corresponding to the privacy space, and then for example by calling" startactivity (intent); the method calls a third application program, and finally the privacy space is displayed in front of the user.
Calling a third application program corresponding to the privacy space through the first application program, and specifically comprising the following steps: judging whether the third application program is a resident background application program or not; and when the third application program is a resident background application program, calling the third application program in a broadcasting mode.
For example, a background-resident application refers to an application that is always in an open state, such as: an alarm application, a desktop application, an input method application, and so forth. Because the application programs are always in the open state, the application programs can receive the broadcast information sent by the first application program, and then the calling of the third application program is realized.
In step S302, the privacy space may be a part of the third application program, and the privacy space may be directly invoked by the third application program; the third application program can also call the fourth application program first, and then call the privacy space through the fourth application program, so that the privacy space is called layer by layer, and then the entrance of the privacy space is hidden deeper, and further the security is higher.
As a further preferred embodiment, in step S103, when the first input parameter is a first preset parameter, invoking a privacy space of the electronic device, please refer to fig. 4, which specifically includes:
step S401: judging whether the electronic equipment receives N input parameters aiming at control interfaces of N application programs in a preset time period before the first input parameter is obtained, wherein each input parameter in the N input parameters meets a corresponding preset condition, and N is a positive integer;
step S402: calling a privacy space when the electronic equipment receives the N input parameters;
step S403: when the electronic device does not receive the N input parameters, the privacy space is not invoked. In step S401, when the user of the electronic device sets the invoking condition of the privacy space, a plurality of invoking conditions may be set, and the privacy space is invoked only when the plurality of invoking conditions are all met, in which case, the security of invoking the privacy space can be further ensured. For example, the condition for invoking the privacy space is set by the user of the electronic device as follows:
alarm clock application set time is 5:00
The piano application inputs the following musical score "55361"
The chat application enters the following "I do not work today" in the chat box of contact A "
When a user starts any one of the three application programs, the corresponding application program can store the characters input by the user as a string type character string array, each time the user inputs the character string array once, the corresponding application program can match the character string array with a preset condition, and if the matching is successful, the electronic device prestores the application program corresponding to the input parameter and the input time, for example: as shown in table 3:
TABLE 3
Figure GDA0002601421700000131
Figure GDA0002601421700000141
Wherein, the first application program is used as the calculator application program, and the first preset parameter is as follows: for example, "1111. - > is determined as the first preset parameter after the first application program detects the user input" 1111. - > is determined, in this case, it indicates that the user of the electronic device may need to call the privacy space, then the application program and the input time corresponding to the input parameters pre-stored by the electronic device are searched, and then whether the electronic device receives N input parameters of the control interfaces for the N application programs within the preset time period is determined based on the pre-stored information
The preset time period is, for example, a fixed time, for example: the preset time period may also be an elastic time from the current time by 1 day, 2 days, etc., for example: the time interval between the last time the privacy space was called and the current time, and so on, and for what the preset time period is, the embodiment of the present invention is not listed in detail and is not limited.
In step S402, taking table 3 as an example, assuming that the preset time period is 3 days, the current time is: 2015-2-721: 30, as can be seen from the results shown in table 3, if the alarm clock application receives the input parameters meeting the predetermined condition 1 time, the chat application receives the input parameters meeting the predetermined condition 2 times, and the piano application receives the input parameters meeting the predetermined condition 1 time, it means that the electronic device receives 3 input parameters for the control interfaces of the aforementioned 3 applications within the predetermined time period, and therefore the privacy space can be invoked.
In step S403, it is assumed that the time of the last activation of the privacy space is: 2015-2-612: 00, where the current time is 2015-2-721: 30, as shown in table 3, it can be seen that the time that the alarm clock application receives the input parameters meeting the preset conditions is 2015-2-611: 00, that is, the alarm clock application does not receive the input parameters meeting the preset conditions after the privacy space is started last time, so that the alarm clock application receives the input parameters meeting the preset conditions for 0 times, the chat application receives the input parameters meeting the preset conditions for 2 times, and the piano application receives the input parameters meeting the preset conditions for 1 time, which indicates that the electronic device does not receive the input parameters for the alarm clock application within the preset time, so that the privacy space is not called.
In addition, when a plurality of call conditions for calling the privacy space are set, the privacy space may also be called when at least M (for example, M is 2, 3, 4, etc., and may be set differently according to actual requirements) of the plurality of call conditions are met. The information in the privacy space can also be set with a security level, wherein if only M calling conditions meet the requirement, the information with lower security level in the privacy space is displayed; if the calling condition is more in accordance with, displaying more information with higher security level; if all call conditions are met, all information in the privacy space is displayed, and so on. As a further preferred embodiment, the step S103 calls a privacy space of the electronic device, specifically: and calling the privacy space corresponding to the first input parameter from the plurality of privacy spaces.
For example, different privacy spaces may be invoked by different input operations, such as those shown in table 4:
TABLE 4
Figure GDA0002601421700000151
Furthermore, if the electronic device needs to call different information, different input operations need to be generated for different applications, taking table 4 as an example, if the user needs to pay, a payment APP needs to be called by inputting "1111.· into the calculator application; if the user needs to call the net disk, a music score '55361' needs to be input in the piano application program; if the user needs to call a confidential contact person, the user needs to start a chat application program at first, select to chat with the contact person A, and finally input 'I do not work today'; if the user needs to view a confidential document, the alarm application needs to be turned on first, then the time is set to 5:00, and so on. Of course, the correspondence between the input operation and the privacy space is only an example, and in the specific implementation process, different correspondences may be set according to actual requirements, which is not described in detail and is not limited in this embodiment of the present invention.
As a further preferred embodiment, when the privacy space of the electronic device is called, specifically: referring to fig. 5, when the icon interface of the information included in the privacy space is called, the method further includes:
step S501: detecting and obtaining information stored in the electronic equipment;
step S502: judging whether selection operation aiming at first information exists or not, wherein the first information is information stored in the electronic equipment;
step S503: and when the selected operation exists, adding the jump interface of the first information into the privacy space, and controlling the first information to be in a hidden state.
In step S501, for example, the privacy space often includes a control interface, and the privacy space can be set by operating the control interface, for example: setting up a short message to be added, a contact to be added, an image to be added, a document to be added, and the like, as shown in fig. 6, is a schematic diagram of a privacy space setting interface.
In the following, a short message is taken as an example to describe in detail how to add information in the privacy space, and the adding manner of other information is similar to that of the short message, so that the details are not repeated. The user can click the position of the privacy short message, and then an interface for adding a new privacy contact person is displayed on the display unit of the electronic equipment, and the user can select where to add the privacy short message, for example: if the user of the electronic equipment selects to add from the short message record, the electronic equipment displays a list of short messages received by the mobile phone, and each list of short messages is followed by a selection box, in which case the information stored by the electronic equipment is: short messages in the short message list;
in step S502, the selection operation is, for example: selecting a selection box behind the short message, wherein the short message corresponding to the selected selection box is the first message;
in step S503, the jump interface of the first information is, for example: an icon of the first information, a click-through interface of the first information, and the like, taking the first information as a certain short message as an example, the skip interface of the first information is, for example: the click-in interface of the short message; if the first information is an APP, the jump interface of the first information is, for example: the APP icon and the like, which interface is the skip interface of the first information, are not listed in detail and are not limited in the embodiments of the present invention.
It is to be understood that the above-described embodiments are only a few, and not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, the above embodiments may be used in combination without conflict.
In a second aspect, based on the same inventive concept, an electronic device according to an embodiment of the present invention is provided, with reference to fig. 7, including:
the first detection module 70 is configured to detect and obtain a first input parameter of a user of the electronic device for a first control interface, where the first control interface is a control interface of a first application program displayed on the electronic device;
a first determining module 71, configured to determine whether the first input parameter is a first preset parameter;
the invoking module 72 is configured to invoke the privacy space of the electronic device when the first input parameter is a first preset parameter, where the second application program bearing the privacy space and the first application program are different application programs.
Optionally, the electronic device further includes:
the second judgment module is used for judging whether the user is a preset type of user before judging whether the first input parameter is a first preset parameter;
the first determining module 71 is specifically configured to:
and when the user is not the preset type of user, judging whether the first input parameter is the first preset parameter.
Optionally, the invoking module 72 specifically includes:
the first calling unit is used for calling a third application program corresponding to the privacy space through the first application program;
and the second calling unit is used for calling the privacy space through the third application program.
Optionally, the invoking module 72 is specifically configured to:
and calling the third application program through an Intent mode.
Optionally, the invoking module 72 specifically includes:
the first judging unit is used for judging whether the third application program is a resident background application program or not;
and the third calling unit is used for calling the third application program in a broadcasting mode when the third application program is a resident background application program.
Optionally, the privacy space includes: and at least one of an application program with a security level higher than a preset level and a file with a security level higher than the preset level.
Optionally, the invoking module 72 is specifically configured to:
calling a control interface of information contained in the privacy space; or
An iconic interface of the contained information of the privacy space is invoked.
Optionally, the invoking module 72 specifically includes:
the second judging unit is used for judging whether the electronic equipment receives N input parameters aiming at the control interfaces of the N application programs in a preset time period before the first input parameters are obtained, wherein each input parameter in the N input parameters meets a corresponding preset condition, and N is a positive integer;
and the fourth calling unit is used for calling the privacy space when the electronic equipment receives the N input parameters.
Optionally, the first control interface specifically includes: a communication interface of the first contact.
Optionally, the invoking module 72 is specifically configured to: when the icon interface of the information contained in the privacy space is called, the electronic device further includes:
the second detection module is used for detecting and acquiring information stored in the electronic equipment;
the third judging module is used for judging whether selection operation aiming at the first information exists or not, wherein the first information is information stored in the electronic equipment;
and the adding module is used for adding the jump interface of the first information into the privacy space and controlling the first information to be in a hidden state when the selection operation exists.
Optionally, the invoking module 72 is specifically configured to:
and calling the privacy space corresponding to the first input parameter from the plurality of privacy spaces.
Optionally, the electronic device further includes:
the determining module is used for determining a first preset parameter corresponding to the current time from the plurality of preset parameters before judging whether the first input parameter is the first preset parameter.
Since the electronic device introduced in the embodiment of the present invention is an electronic device corresponding to the information invoking method introduced in the embodiment of the present invention, based on the information invoking method introduced in the embodiment of the present invention, a person skilled in the art can understand the specific structure and the modifications of the electronic device introduced in the embodiment of the present invention, and thus the details are not described herein, and all electronic devices applied to the information invoking method introduced in the embodiment of the present invention belong to the scope to be protected by the embodiment of the present invention.
One or more embodiments of the invention have at least the following beneficial effects:
in the embodiment of the invention, first input parameters of a user of the electronic equipment for a first control interface are detected and obtained, wherein the first control interface corresponds to a first application program; then judging whether the first input parameter is a first preset parameter or not; and finally, calling the privacy space of the electronic equipment when the first input parameter is the first preset parameter. That is to say, the jump interface of the privacy space is disguised as the first control interface of the first application program, wherein the second application program bearing the privacy space and the first application program are different application programs, that is, the user can call the privacy space when operating the first application program, so that the technical effect of improving the confidentiality of the privacy space is achieved, and other users cannot judge whether the privacy space is installed on the electronic device according to the application list, so that cracking cannot be performed, and the security is also high.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to an embedded controller of a general purpose computer, special purpose computer, embedded processor, or other programmable information processing apparatus to produce a machine, such that the instructions, which execute via the embedded controller of the computer or other programmable information processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable information processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable information processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (22)

1. An information calling method is applied to electronic equipment, and a first control interface of a first application program is displayed on the electronic equipment, and is characterized by comprising the following steps:
detecting and obtaining a first input parameter of a user of the electronic equipment for the first control interface;
judging whether the first input parameter is a first preset parameter or not;
judging whether the electronic equipment receives N input parameters aiming at control interfaces of N application programs in a preset time period before the first input parameter is obtained, wherein each input parameter in the N input parameters meets a corresponding preset condition, and N is a positive integer; and when the electronic equipment receives the N input parameters, calling the privacy space, wherein a second application program bearing the privacy space and the first application program are different application programs.
2. The method of claim 1, wherein prior to said determining whether said first input parameter is a first predetermined parameter, said method further comprises:
judging whether the user is a preset type of user or not;
the judging whether the first input parameter is a first preset parameter specifically comprises:
and when the user is not the user of the preset type, judging whether the first input parameter is the first preset parameter.
3. The method of claim 1, wherein the invoking the privacy space of the electronic device specifically comprises:
calling a third application program corresponding to the privacy space through the first application program;
invoking, by the third application, the privacy space.
4. The method according to claim 3, wherein the invoking of the third application corresponding to the privacy space by the first application is specifically:
and calling the third application program through an Intent mode.
5. The method of claim 3, wherein the invoking, by the first application, a third application corresponding to the privacy space specifically comprises:
judging whether the third application program is a resident background application program or not;
and when the third application program is the resident background application program, calling the third application program in a broadcasting mode.
6. The method of any of claims 1-5, wherein the privacy space comprises: and at least one of an application program with a security level higher than a preset level and a file with a security level higher than the preset level.
7. The method according to any of claims 1 to 5, wherein said invoking a privacy space of said electronic device is specifically:
calling a control interface of the information contained in the privacy space; or
Invoking an iconic interface of the information contained in the privacy space.
8. The method according to any one of claims 1 to 5, wherein the first control interface is specifically: a communication interface of the first contact.
9. The method according to any of claims 1 to 5, wherein in said invoking the privacy space of the electronic device, in particular: when the icon interface of the information contained in the privacy space is called, the method further comprises the following steps:
detecting and obtaining information stored in the electronic equipment;
judging whether information has selection operation aiming at first information, wherein the first information is information stored in the electronic equipment;
and when the selection operation exists, adding the jump interface of the first information into the privacy space, and controlling the first information to be in a hidden state.
10. The method according to any of claims 1 to 5, wherein said invoking a privacy space of said electronic device is specifically:
and calling the privacy space corresponding to the first input parameter from a plurality of privacy spaces.
11. The method of any of claims 1-5, wherein prior to said determining whether said first input parameter is a first predetermined parameter, said method further comprises:
and determining the first preset parameter corresponding to the current time from a plurality of preset parameters.
12. An electronic device, comprising:
the first detection module is used for detecting and obtaining a first input parameter of a user of the electronic equipment aiming at a first control interface, wherein the first control interface is a control interface of a first application program displayed on the electronic equipment;
the first judgment module is used for judging whether the first input parameter is a first preset parameter or not;
the calling module is used for judging whether the electronic equipment receives N input parameters aiming at the control interfaces of N application programs in a preset time period before the first input parameter is obtained when the first input parameter is the first preset parameter, wherein each input parameter in the N input parameters meets a corresponding preset condition, and N is a positive integer; and when the electronic equipment receives the N input parameters, calling a privacy space of the electronic equipment, wherein a second application program bearing the privacy space and the first application program are different application programs.
13. The electronic device of claim 12, wherein the electronic device further comprises:
the second judging module is used for judging whether the user is a preset type of user before judging whether the first input parameter is a first preset parameter;
the first judging module is specifically configured to:
and when the user is not the user of the preset type, judging whether the first input parameter is the first preset parameter.
14. The electronic device of claim 12, wherein the invoking module specifically comprises:
the first calling unit is used for calling a third application program corresponding to the privacy space through the first application program;
and the second calling unit is used for calling the privacy space through the third application program.
15. The electronic device of claim 14, wherein the invoking module is specifically configured to:
and calling the third application program through an Intent mode.
16. The electronic device of claim 14, wherein the invoking module specifically comprises:
the first judging unit is used for judging whether the third application program is a resident background application program or not;
and the third calling unit is used for calling the third application program in a broadcasting mode when the third application program is the resident background application program.
17. The electronic device of any of claims 12-16, wherein the privacy space comprises: and at least one of an application program with a security level higher than a preset level and a file with a security level higher than the preset level.
18. The electronic device according to any of claims 12-16, wherein the invoking module is specifically configured to:
calling a control interface of the information contained in the privacy space; or
Invoking an iconic interface of the information contained in the privacy space.
19. The electronic device according to any of claims 12-16, wherein the first control interface is specifically: a communication interface of the first contact.
20. The electronic device of any of claims 12-16, wherein when the invoking module is an icon interface for invoking information contained in the privacy space, the electronic device further comprises:
the second detection module is used for detecting and obtaining the information stored in the electronic equipment;
a third determining module, configured to determine whether a selection operation for first information exists, where the first information is information stored in the electronic device;
and the adding module is used for adding the jump interface of the first information into the privacy space and controlling the first information to be in a hidden state when the selection operation exists.
21. The electronic device according to any of claims 12-16, wherein the invoking module is specifically configured to:
and calling the privacy space corresponding to the first input parameter from a plurality of privacy spaces.
22. The electronic device of any of claims 12-16, wherein the electronic device further comprises:
the determining module is used for determining the first preset parameter corresponding to the current time from a plurality of preset parameters before judging whether the first input parameter is the first preset parameter.
CN201510159107.5A 2015-04-03 2015-04-03 Information calling method and electronic equipment Active CN106156646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510159107.5A CN106156646B (en) 2015-04-03 2015-04-03 Information calling method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510159107.5A CN106156646B (en) 2015-04-03 2015-04-03 Information calling method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106156646A CN106156646A (en) 2016-11-23
CN106156646B true CN106156646B (en) 2020-09-22

Family

ID=57338452

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510159107.5A Active CN106156646B (en) 2015-04-03 2015-04-03 Information calling method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106156646B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN107948054A (en) * 2017-11-15 2018-04-20 珠海市魅族科技有限公司 Instant communication method and device, computer installation and computer-readable recording medium
CN108989350B (en) * 2018-08-31 2021-03-19 北京梆梆安全科技有限公司 Method, device and equipment for detecting denial of service vulnerability

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN102819714A (en) * 2012-07-27 2012-12-12 东莞宇龙通信科技有限公司 Terminal and safe control method of application program
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN103824004A (en) * 2014-02-26 2014-05-28 可牛网络技术(北京)有限公司 Application program protection method and device
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104320708A (en) * 2014-10-14 2015-01-28 小米科技有限责任公司 User right handling method and device of smart television

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN102819714A (en) * 2012-07-27 2012-12-12 东莞宇龙通信科技有限公司 Terminal and safe control method of application program
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103577761A (en) * 2013-10-25 2014-02-12 北京奇虎科技有限公司 Method and device for processing privacy data in mobile equipment
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN103824004A (en) * 2014-02-26 2014-05-28 可牛网络技术(北京)有限公司 Application program protection method and device
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104320708A (en) * 2014-10-14 2015-01-28 小米科技有限责任公司 User right handling method and device of smart television

Also Published As

Publication number Publication date
CN106156646A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
US11727093B2 (en) Setting and terminating restricted mode operation on electronic devices
US11256381B2 (en) Method for providing message function and electronic device thereof
CN105408847B (en) User terminal and and its display lock-screen method
US8909297B2 (en) Access management
EP2830296A1 (en) Method and apparatus for processing data and message
CN109005283B (en) Method, device, terminal and storage medium for displaying notification message
US20160037481A1 (en) Rich Notifications
US9182889B1 (en) Preventing unintentional user activation of user interface elements
US20160034424A1 (en) Adaptive Notifications on a Screen
TW201644233A (en) Instant communication message processing method and client
CN102999263A (en) Electronic device and method for providing background of the electronic device
CN106796510A (en) For presenting and equipment, method and the graphic user interface of application be installed
US20160034695A1 (en) Displaying Different Levels of Personal Information on a Screen
CN113177190A (en) Document content sharing method and electronic equipment
CN106156646B (en) Information calling method and electronic equipment
CN102314568A (en) Method and terminal for adjusting security levels
CN107145771B (en) Application program unlocking method and device and terminal
CN109219003B (en) Information encryption method and device, storage medium and electronic equipment
WO2015107396A1 (en) Authenticating a user
EP3528151A1 (en) Method and apparatus for user authentication
US9846980B2 (en) Lock releasing method of electronic device, and apparatus thereof
CN107066864B (en) Application icon display method and device
CN106933666B (en) Method for calling information input program and electronic equipment
US20160182498A1 (en) Separated use mobile devices
US20120290665A1 (en) Systems and methods for changing application information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant